Cisco CiscoWorks Network Compliance Manager 1.8 데이터 시트
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 4
Data Sheet
CiscoWorks Network Compliance Manager 1.7
CiscoWorks Network Compliance Manager (NCM) tracks and regulates configuration
and software changes throughout a multivendor network infrastructure. It provides
superior visibility into network changes and can track compliance with a broad variety
of regulatory, IT, corporate governance, and technology requirements. NCM helps IT
staff identify and correct trends that could lead to problems such as network instability
and service interruption.
and software changes throughout a multivendor network infrastructure. It provides
superior visibility into network changes and can track compliance with a broad variety
of regulatory, IT, corporate governance, and technology requirements. NCM helps IT
staff identify and correct trends that could lead to problems such as network instability
and service interruption.
Product Overview
Enterprises seeking to facilitate high performance business applications increasingly rely on sophisticated
networking infrastructure and the power of new technologies. Network operations and security managers rely on
systems that can automate network deployments, handle large and complex topologies, and track and audit how
actual network deployments comply with design requirements and best practices. Enterprise networks must
comply with regulatory policies, corporate IT methodologies, and technology best practices - independently of
scale, networking technologies deployed, and the combination of vendors providing networking equipment. NCM
helps users meet regulatory compliance goals and enforce internal IT best practices.
Network Lifecycle Automation
NCM automates the complete operational lifecycle of network devices, which includes:
●
Discover and track: Includes discovering and cataloging the network, visualizing the Layer 2 and Layer 3
network topology, initial device turn-up, and creating initial snapshots of device configurations
●
Change and configure: Includes creating and deploying configuration changes in a structured manner,
such as using configuration templates or scripts, peer reviewing and approving proposed changes, and
maintaining an archive of previous configurations
●
Audit and enforce: Includes defining compliance policies for your network devices, detecting violations in
real time, and autoremediating problems
●
Maintain and support: Includes providing reports on device inventory, change activity, and compliance
Enforce Policies, Standardize Operations, and Meet Compliance
Bringing networks into compliance with corporate or regulatory standards is a nontrivial, labor-intensive,
error-prone, and difficult task. NCM helps you meet compliance standards through a network compliance model
that maps device information, including configurations and run-time diagnostics, as well as policies and user roles,
into a normalized structure to prevent compliance violations before they occur.
Built-in best practices immediately measure network compliance against industry-accepted best practices. NCM
incorporates policies such as the National Security Agency (NSA) router configuration guidelines.
Predefined reports for Information Technology Infrastructure Library (ITIL), the Sarbanes-Oxley Act (SOX), the
Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry (PCI) standard, and other